Cloud Security Monitoring
Cloud has transformed the workplace, driving efficiencies and accelerating business growth. Complete visibility into a cloud or hybrid IT environment is critical but something many organizations lack, along with the resources to detect and respond to threats that target their users, data, devices and applications.
The Cloud Security Specialists
Our Managed Detection and Response services (MDR) provide 24×7 visibility and protection for your Amazon AWS, Microsoft Office 365, and Azure environments. With experienced threat hunters and analysts on hand, we have the tools and expertise to monitor and analyze 24/7 your cloud security data, triggering high-fidelity alerts when needed and reducing risk.
Superior Threat Detection and Response Service
Get complete visibility into threats and misconfiguration issues across your Amazon AWS, Microsoft Azure and Office 365 environments.
Proactively ensure identity, user, data, and cloud application security.
Rapidly identify and mitigate cyber threats, support remediation, no matter where they arise.
A Unique Approach to Cloud Security Monitoring
Rapid Threat Mitigation
The Cyber Fusion Center finds and contains cyber threats in minutes, no matter where in your AWS, Azure, Office 365 or hybrid environments they arise.
Proactive Threat Hunting
Technology isn’t enough to secure your business. Our threat hunting specialists proactively search for and neutralize cyber threats.
Native Cloud Security Monitoring
Kudelski Security provides 24/7/365 cloud security monitoring without the need for additional technology purchases, simplifying threat visibility for your AWS, Azure and Office 365 environments.
The MSS client portal provides real-time alerts, visualizations and contextual relevance as well as 24/7 access to analysts for actionable, prioritized advice
CurveBall: Microsoft Windows CryptoAPI Spoofing Vulnerability Webcast
Kudelski Security’s Francisco Donoso, Director – Global Security Strategy, provides a brief webcast overview of CurveBall, the Microsoft Windows cryptographic API vulnerability. Today, we’ll be talking about CurveBall, a Microsoft Windows cryptographic API vulnerability. We’ll give you a brief overview of Curveball as the vulnerability is called, talk a little bit about the potential impact and what you can do to remediate and detect.
Webcast: Office 365 Threat Landscape & Kill Chain Review
85% of Kudelski Security incident response engagements in 2019 involved Office 365 compromises. Download the webcast to learn about current Microsoft Office 365 compromise tactics across the attack kill chain.
You Suck at Office 365 Logging
One of the misconceptions about cloud services is that you have to surrender all control when you sign-up. While it is true that you may no longer have racks of servers with blinking lights humming away in your data center, it doesn’t mean that you no longer have any visibility into how your users use and interact with the service.
Microsoft Advisory: Microsoft Server Message Block 3 (SMBv3) Vulnerability
On March 10th, a critical Remote Code Execution (RCE) vulnerability in the Microsoft Server Message Block (SMBv3) protocol was inadvertently disclosed. The vulnerability, known as CVE-2020-0796, is caused by how newer Windows operating systems handle certain requests, specifically compressed SMBv3 packets. Microsoft intended to release a patch for this vulnerability as part of March’s “Patch Tuesday”, however, the patch appears to have been pulled at the last minute. This led to the inadvertent disclosure of the issue before a patch is available.
Get in Touch
Talk to one of our experts to learn how our award-winning cyber-security services can act as a force multiplier for your your organization.